Welcome to the Merchant Advisory Group CyberRisk Hub!
You must be a registered user to access the CyberRisk Hub.
- If you are already registered, enter your Username and Password in the Member Login box in the upper right corner of this screen.
- If this is your first time here, please complete the New User Registration form below.
Note: You must have a valid Access Code in order to complete your registration. You should have received an Access Code with your policy. If you do not have an Access Code, please contact email@example.com. If you have an Access Code, but are experiencing difficulties registering or logging in, please contact firstname.lastname@example.org.
New User Registration
The MAG CyberRisk Hub that MAG engaged NetDiligence® to provide for you, lists specific third-party technical and legal resources that may assist you in recovering from an incident. Please note that MAG has listed these highly specialized vendors solely as a convenience to you and to help you expedite your recovery. Be aware that MAG does not endorse the vendors’ respective services. MAG is not affiliated with these third-party vendors nor are we receiving compensation or other benefit for listing them in this portal. Before you engage any of these companies, MAG urges you to conduct your own due diligence to ensure the companies and their services meet your needs. Unless otherwise indicated or approved, the cost of services from these companies is your responsibility. Should you choose to engage a vendor or service, you are doing so at your own risk and MAG has no liability to you regardless of the outcome of your engagement of any vendor The CyberRiskHub also contains certain tools, descriptions, checklists, guidance, and aggregated information. MAG provides these resources solely as a convenience to you, and does not endorse these resources or warrant the accuracy of information provided or contained in these resources. The MAG is not providing any legal advice to you and in the event of a data breach or other security incident, you are urged to engage with your own professionals, legal and otherwise.
An often-overlooked risk in cyber security is software development and testing, which is often done in house in large companies. To test software, engineers utilize either scrubbed data and where the process of scrubbing personally identifiable information is too complex, costly or time-consuming, live data is used, posing serious security and privacy risks. I learned more about this issue by talking to Chris Pillay, CEO of Meridian Technologies.
Why would a company need to be concerned about sensitive data in their own environment?